Comment by trollbridge
4 hours ago
Your only practical defence is to set up a local LLM that destroys records in a predictable way (immediately, on a time table and so forth) and then ensure however you access that doesn’t leave any traces either.
And then you need to consistently use this for purposes other than crime.
No comments yet
Contribute on Hacker News ↗